Claim Missing Document
Check
Articles

Found 5 Documents
Search

Fire Prevention System Using RGB Algorithm Amirathul Athirah Abdul Rahman; Norharyati Harum; Erman Hamid
Conference on Business, Social Sciences and Technology (CoNeScINTech) Vol 3 No 1 (2023): Conference on Business, Social Sciences and Technology (CoNeScINTech)
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/conescintech.v3i1.8326

Abstract

Most of the fire prevention system use smoke and heat sensors to detect the fire, leads to late action to stop the fire and cause a large damage. To avoid the problem, a fire prevention system that utilizes the RGB algorithm for early fire detection has been developed. By employing RGB algorithm and real-time monitoring, the system aims to enhance fire safety in various environments. The system consists of high-resolution cameras strategically placed in the monitored area. These cameras capture real-time video that are processed using the RGB algorithm. The algorithm analyses the video to identify patterns indicative of a fire outbreak, such as intense red and orange colours, and changes in brightness. Once a potential fire hazard is detected, the system triggers immediate alerts to relevant stakeholders through Telegram notifications, and audible alarms. To complement early detection, the system incorporates preventive measures such as automatic sprinkler systems, which can be activated manually or automatically. Overall, the fire prevention system leveraging the RGB algorithm offers early fire detection, real-time monitoring, and seamless integration with existing fire safety infrastructure. By combining these features, the system has the potential to significantly enhance fire safety in various environments, protecting lives and property.
Smart Door Lock System by Using Face Recognition Amirah Syahirah Ariffin; Norharyati Harum
Conference on Business, Social Sciences and Technology (CoNeScINTech) Vol 3 No 1 (2023): Conference on Business, Social Sciences and Technology (CoNeScINTech)
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/conescintech.v3i1.8333

Abstract

Security is one of the main concerns to people who resides in a house as there is a lot of cases such as robbery. Thus, the safety of people is the utmost importance. However, people still use the traditional door lock to secure their home. Therefore, this paper presents the idea of using Face Recognition and Telegram application as part of the smart features to enhance the home security. Face Recognition methods that will be used are Local Binary Pattern Histogram (LBPH) which act as feature extraction under local appearance-based techniques and Haar Cascade as a classifier. Besides, the usage of Telegram application will also be utilised. As the output, the Face Recognition technology is being used to grant authorized user access to the house and the Telegram application is being used to remotely control the door lock without any keys. In conclusion, by implementing those advanced technologies it will strengthen the security of the home as well as the wellbeing of the people.
Development of a Healthy Workplace Monitoring System using IoT Technology Asılahtul Afrına Samsudın; Norharyati Harum; Nur Atikah Arbain; Erman Hamid
Conference on Business, Social Sciences and Technology (CoNeScINTech) Vol 3 No 1 (2023): Conference on Business, Social Sciences and Technology (CoNeScINTech)
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/conescintech.v3i1.8327

Abstract

Chronic respiratory symptoms such as long-lasting cough, wheezing, shortness of breath, and chest pain are symptoms of respiratory problems mainly developed due to occupational exposures. Occupational disease is primarily produced by the air of the factories polluted by poisonous gases, fumes and dust emanating from the manufacturing processes. An unhealthy environment will affect the worker's productivity, leading to low productivity in the workplace. In this work, we have developed a monitoring system to monitor air pollution in a workspace. The developed system is designed with a smart alert system that can help workspace management to receive a notification when the workspace is in bad air pollution conditions. The system is developed using the Rapid Application Development model by considering three-layer Internet-of-Things Architecture. The system is equipped with sensors and Arduino in the device layer, Wi-Fi in the network layer, and a cloud platform in the application layer. The developed prototype is verified through functional tests, gas detection and cloud integration.
Library Management System Norhazifa Harum; Najwan Md Khambari; Norharyati Harum
Conference on Business, Social Sciences and Technology (CoNeScINTech) Vol 3 No 1 (2023): Conference on Business, Social Sciences and Technology (CoNeScINTech)
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/conescintech.v3i1.8334

Abstract

Manual library management requires a higher workforce for librarians and causes discrepancies during data encoding. The transaction history is too numerous and needs to be stored over a long period of time, requiring a lot of files for storage. With the advent of digital technology and the increasing complexity of library functions, traditional manual systems have become inefficient and time-consuming. In this work, an automated Library Management System (LMS) was developed specifically for education such as universities or colleges where users are students and admin to simplify the management of library resources, enhance accessibility, and improve overall efficiency. The system provides a user-friendly interface that enables librarians to quickly and accurately add, search, and update bibliographic information, ensuring a well-organized and easily searchable library collection. Also, it provides alternative methods for students to perform the borrowing process and check the current book availability at library through the system. The system also supports a range of user services, including patron registration, tracking borrowing history, and managing fines and penalties. The methodology used for this system is the Waterfall model, from the Software Development Life Cycle (SDLC). Overall, the LMS offers a comprehensive and efficient solution to address the challenges faced by modern libraries.
Comparative Study on Preventing Security Attacks in Automated Gate System Erman Hamid; Hani Maisarah Zainal Subari; Norharyati Harum; Robiah Yusof
Conference on Business, Social Sciences and Technology (CoNeScINTech) Vol 3 No 1 (2023): Conference on Business, Social Sciences and Technology (CoNeScINTech)
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/conescintech.v3i1.8332

Abstract

This study is conducted to identify the current approach to preventing security attacks in one of the Internet of Things – the Automated Gate System. The question of vulnerability of the Automated Gate System is a critical issue as this system acts as a front line that protects an organization from any security intrusion. A sound security system leads to the cyber and physical security of the organization, enabling the organization to move forward in achieving management goals. The focus is specifically on methods and techniques for security elements used in previous studies, prompting answers to questions on security mechanisms to Automated Gate Systems that are practical and reliable. The literature review shows various studies conducted on this issue, focusing on how an IoT system for automated gates operates, how it works logically and physically, the security level, and the extent to which a gate system is immune from hacking. This study employed the Content Analysis technique, meaning the previous research data were analyzed and summarized scientifically. It continued with interviews conducted with experts and owners of the Automated Gate System. It is a series of activities analyzing and summarizing the scientific 'data' produced by previous research and interviews. The 'data' refers to spoken, written, or visual pictures, words, symbols, meanings, ideas, diagrams, or any message that can be analyzed. The study then focused on a final comparison involving three security techniques on the IoT Gate System: a QR Code System, RFID System, and Vehicle License Plate Recognition System, which is a reliable but practical technique for an IoT Automated Gate System. This study ultimately offers future work to analyze the three selected Automated Gate Systems with a selected security testing technique, with the objective of security but with practical financial capabilities.